Displaying results 11 - 20 of 40

… visitors or customers. All staff and visitors should wear ID badges/passes while they are at your premises. This is to ensure that staff are able to identify who works at your business and who is visiting your … Tactic DB6: Ensure all staff are challenged and their ID checked …
… take appropriate security measures and be vigilant.   Individuals should think about:   restricting access to the … your fertiliser in a secure barn or, if it is in an open-sided barn, covering it with a tarpaulin. You should also …
… use and location. Keep litter bins to a minimum and consider use of clear bags for waste disposal as it provides an easier opportunity for staff to conduct examinations … communal areas e.g. exits, entrances, toilets, service corridors and yards clean, tidy and well lit. Keep the fixtures, …
… and protective security fencing that are deployed to provide hostile vehicle mitigation (HVM) schemes.   The NVTMU … Security Coordinators in their responsibilities to provide the best advice, guidance and deployments of HVM to support their policing … various events. Their expertise extends beyond individual instances, allowing them to fine-tune deployments and …
… businesses. The NPSA has developed a document which provides guidance in relation to Crisis Management for Terrorist Related Events .  However, it is a good idea to look beyond the organisation and the crisis team in …
… At ProtectUK we provide free and easy access to information, guidance, and online learning to help businesses and those … their security preparedness, and respond effectively to incidents of terrorism. We have a range of free to use … used by business owners and operators. The RMP provides a step by step process for decision makers with little …
… A properly conducted risk assessment should give a good idea of the likely threat to an organisation and indicate … a particular end or in a particular way oddly shaped or lopsided packages an envelope flap stuck down completely … being marked as ‘to be opened only by…’, ‘personal’ or ‘confidential’ an item addressed to the organisation or a title …
… hoaxes. Items left insecure on site, such as flammable liquids, tools, scaffolding poles and ladders, could be used by … the number of places where devices may be left by considering the following points: avoid the use of litter bins in vulnerable areas (e.g. near …
… we know they are generally fast-moving, violent incidents, where attackers aim to kill or injure as many people … facilitate the police response. When talking about MTA, consideration should be given to the following: has the organisation assessed the risk? If it considers the risk to be significant, is there a plan? does the …
… 1. The threat Terrorists have used false identities when planning attacks. Terrorist and criminal … organisations are able to print false passports and other identity documents, which can be used to enter the UK … to sites and hire vehicles for unlawful purposes.      2. Identity document fraud Identity document fraud can be …